Session 1 - Modelling state
|
09.30-10.00 |
Robert Künnemann - A Survey on Protocol Verification and Security APIs
|
10.00-10.30 |
Joshua Guttman and Daniel Dougherty - Protocols and State: The Envelope Example
|
10.30-11.00 | Coffee Break
|
Session 2 - Security APIs and Computational Cryptographic Models (joint session with FCC)
|
11.00-12.00 | Invited Talk: Cédric Fournet - From APIs to Computational Cryptography: A Verified Implementation of TLS
|
12.00-12.30 | François Dupressoir, Andrew D. Gordon and Cédric Fournet - Proving Computational Security with a General-Purpose C Verifier |
12.30-14.00 | Lunch (provided)
|
Session 3 - Key Management APIs
|
14.00-14.30 | Veronique Cortier, Graham Steel and Cyrille Wiedling -
Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices
|
14.30-15.00 | Christian Cachin, Divay Bansal and Günter
Karjoth - Key Management with Policy-based Access Control
|
15.00-15.30 | Riccardo Focardi and Flaminia Luccio - Towards a type-based analysis of real PKCS#11 devices
|
15.30-16.00 | Coffee Break
|
Session 4 - New Applications
|
16.00-16.30 | Arjun Guha, Benjamin Lerner, Joe Politz and Shriram
Krishnamurthi - Web API Verification: Results and Challenges
|
16.30-17.00 | Karthikeyan Bhargavan and Jean Karim Zinzindohoué - Building secure smartphone applications
|
17.00-17.30 | ASA Business meeting
|
20.00 | workshop dinner, details TBA
|